Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 08:58
Static task
static1
Behavioral task
behavioral1
Sample
4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe
Resource
win10v2004-20241007-en
General
-
Target
4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe
-
Size
689KB
-
MD5
c682ea1c8cc3f2b71811fa851fc15ba1
-
SHA1
1daad07ac57b0340c5cefdd8145fb5fbae27535a
-
SHA256
4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e
-
SHA512
c16e3ad93256527037ec01bba33a692e07a74f1043eaaf6b9b17249a4260c8080af9b59d52940824c905f907dfe21769bb1c6bf75f1f0107f49697b7e8b4e7f3
-
SSDEEP
12288:7Mryy90u4XCLY/hzCraEulyV65hLuNw+odqgy0xK6YvvOFgnfigFnZVxSgAKW:hy8XCQumZMIfaGByh6YvqgnagjnW
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/244-19-0x0000000002500000-0x000000000251A000-memory.dmp healer behavioral1/memory/244-21-0x0000000004CA0000-0x0000000004CB8000-memory.dmp healer behavioral1/memory/244-22-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/244-49-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/244-47-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/244-45-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/244-43-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/244-41-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/244-39-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/244-37-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/244-35-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/244-33-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/244-31-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/244-29-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/244-27-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/244-25-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/244-23-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer -
Healer family
-
Processes:
pro1018.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1018.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1018.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1018.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1018.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1018.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1018.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/5036-61-0x00000000038A0000-0x00000000038E6000-memory.dmp family_redline behavioral1/memory/5036-62-0x0000000003B50000-0x0000000003B94000-memory.dmp family_redline behavioral1/memory/5036-68-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/5036-88-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/5036-94-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/5036-92-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/5036-91-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/5036-87-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/5036-84-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/5036-82-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/5036-81-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/5036-78-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/5036-76-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/5036-74-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/5036-72-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/5036-70-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/5036-96-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/5036-66-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/5036-64-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline behavioral1/memory/5036-63-0x0000000003B50000-0x0000000003B8F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un218863.exepro1018.exequ0940.exepid process 4244 un218863.exe 244 pro1018.exe 5036 qu0940.exe -
Processes:
pro1018.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1018.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1018.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un218863.exe4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un218863.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5068 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4904 244 WerFault.exe pro1018.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exeun218863.exepro1018.exequ0940.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un218863.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1018.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0940.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1018.exepid process 244 pro1018.exe 244 pro1018.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1018.exequ0940.exedescription pid process Token: SeDebugPrivilege 244 pro1018.exe Token: SeDebugPrivilege 5036 qu0940.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exeun218863.exedescription pid process target process PID 1084 wrote to memory of 4244 1084 4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe un218863.exe PID 1084 wrote to memory of 4244 1084 4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe un218863.exe PID 1084 wrote to memory of 4244 1084 4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe un218863.exe PID 4244 wrote to memory of 244 4244 un218863.exe pro1018.exe PID 4244 wrote to memory of 244 4244 un218863.exe pro1018.exe PID 4244 wrote to memory of 244 4244 un218863.exe pro1018.exe PID 4244 wrote to memory of 5036 4244 un218863.exe qu0940.exe PID 4244 wrote to memory of 5036 4244 un218863.exe qu0940.exe PID 4244 wrote to memory of 5036 4244 un218863.exe qu0940.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe"C:\Users\Admin\AppData\Local\Temp\4c7f7f344678cac17323fe75d68394b4d8a7f408c6400891d9f3f93b05c1b86e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un218863.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un218863.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1018.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1018.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 244 -s 10804⤵
- Program crash
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0940.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0940.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 244 -ip 2441⤵PID:3692
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5068
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD5fc67516aae181da768c2f1dbaade3f98
SHA147792fac9fc105bbf8988e14530408ac0534d672
SHA256dd5c42619ac2d0922e5e6b89a5630d3706103ea67e0e9822382841aaf1fff9af
SHA5122a5d5ac76188f238a446a984d1c2cff02b1ce7b5f59a0060b7746289c72f0a58eb753b1008af4d187817aa5e04b3095678cba0e8f40064d5e4c679d8e0b31d49
-
Filesize
291KB
MD5c72f8f076bb983c6330de4431a3f84df
SHA145712ea3683c4ee31792ec3df23ccfcbdbb6148a
SHA256e759ab21fb5459580f7b5ad3a8119ba3256fdbd99575e8cad0b7498452779dae
SHA512b17a85948c5babb53aff50dfcb52add86c75911d81042b1b5695086ae77cd02c51daa7d4a73d6b8de698887f9193fdb8e5ff68559a1b87ea0db33415909943af
-
Filesize
345KB
MD538f1395e7e5cd9ef6e604363ae99ab50
SHA1cc8c638e11151e228b55256ec543380ac8c41818
SHA256d19e587c7005427fb68b877cc83a644f0d45c5a31fc05f034c0b6738ea472938
SHA51284f5bd9d6eed19c57414756349e3a35f97d3b22e620be7e40bd588e5814e881f45456c1f9b9aaecf2dcfd380e2e37156829b726c8cb7805c803f1faf0d1f27f1